Thanks!

What is a Secure Enterprise Architecture Roadmap?

Critical Infrastructures such as Power, Water, Internet, Pipeline (Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

Defending our Critical Infrastructure

Juanita Koilpillai and Mark Rasch Aug 16, 2018| 61 mins

Critical Infrastructures such as Power, Water, Internet, Pipeline (Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

Moderator: David Morris Panelists

Juanita Koilpillai, CEO of Waverley Labs

Mark Rasch, Chief Legal Counsel, Digital Risk Management Institute

In this session, you will learn:

Attacks most commonly used

Defensive measures

Best practices

The State of Cybersecurity in the Healthcare Industry

In this session, we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature. Learn from the following leading experts:

Software Defined Perimeter – In Depth Use Cases

This session will include a brief overview of Software Defined Perimeters and will then proceed to drill-down on specific use cases. In this session, you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them. Join this panel of SDP experts:

FEDRAMP – What is it and why should I care?

Juanita Koilpillai: Former CTO of one of the first FedRAMP Third Party Assessors (3PAOs)

Dr. Merrick Watchorn: FedRAMP High Security Control Baseline Team Lead, Cloud Computing Standards Roadmap, High Performance Computing Work Group

Aaron Bishop: Former CISO at SAIC, General Manager at National Security Group, Microsoft, CIO at ANSTEC

This session will cover FEDRAMP – the Government’s complicated process for the protection of information assets. The difference between infrastructure and application security.The challenges & pitfalls in meeting the NIST framework for Federal Cloud adoption.

Cloud Security – Protection Against Evolving Data Security Threats

Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai

Oct 24 2017| 63 mins

Cloud Security- Protection Against Evolving Security Threats Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

Cloud Security & Integration: Protecting your Applications & Data

Ulf Mattsson, David Morris, Juanita Koilpillai Oct 19 2017| 61 mins

Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win? In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

2017 Trends in IoT Cyber Attacks

There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. Viewers will learn: • Current trends in Cyber attacks for IoT • Security Metrics for IoT • Oversight of third parties in IoT • How to measure cybersecurity preparedness for IoT • Automated approaches to integrate Security into IoT